Cargando…

The database hacker's handbook : defending database servers /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Litchfield, David, 1975- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley, ©2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm70704839
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 060306s2005 inua ob 001 0 eng d
040 |a UAB  |b eng  |e pn  |c UAB  |d OCLCE  |d OCLCQ  |d B24X7  |d UMI  |d IUL  |d C6I  |d OCLCQ  |d OCLCO  |d N$T  |d DEBSZ  |d OCLCQ  |d OCLCF  |d YDXCP  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d OCLCA  |d REB  |d CEF  |d WYU  |d UAB  |d AU@  |d RDF  |d OCLCO  |d OCLCQ  |d INARC 
019 |a 603545600  |a 606030789  |a 607730466  |a 786166479 
020 |a 0764578014  |q (paper/website) 
020 |a 9780764578014  |q (paper/website) 
020 |a 9781461919254  |q (electronic bk.) 
020 |a 1461919258  |q (electronic bk.) 
024 3 |a 9780764578014 
029 1 |a AU@  |b 000053224948 
029 1 |a AU@  |b 000067090763 
029 1 |a DEBBG  |b BV040901048 
029 1 |a DEBSZ  |b 378282328 
029 1 |a DEBSZ  |b 381370798 
029 1 |a GBVCP  |b 785438009 
029 1 |a UNITY  |b 075496704 
035 |a (OCoLC)70704839  |z (OCoLC)603545600  |z (OCoLC)606030789  |z (OCoLC)607730466  |z (OCoLC)786166479 
037 |a CL0500000133  |b Safari Books Online 
042 |a dlr 
050 4 |a TK5105.59  |b .D3 2005eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 4 |a The database hacker's handbook :  |b defending database servers /  |c David Litchfield [and others]. 
260 |a Indianapolis, Ind. :  |b Wiley,  |c ©2005. 
300 |a 1 online resource (xxviii, 500 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen. 
504 |a Includes bibliographical references and index. 
505 0 |a Why care about database security? -- The Oracle architecture -- Attacking Oracle -- Oracle : moving further into the network -- Securing oracle -- IBM DB2 Universal Database -- DB2 : discovery, attack, and defense -- Attacking DB2 -- Securing DB2 -- The Informix architecture -- Informix : discovery, attack, and defense -- Securing Informix -- Sybase architecture -- Sybase : discovery, attack, and defense -- Sybase : moving further into the network -- Securing Sybase -- MySQL architecture -- MySQL : discovery, attack, and defense -- MySQL : moving further into the network -- Securing MySQL -- Microsoft SQL Server architecture -- SQL Server : exploitation, attack, and defense -- Securing SQL Server -- The PostgreSQL architecture -- PostgreSQL : discovery and attack -- Securing PostgreSQL -- Example C Code for a time-delay SQL injection harness -- Dangerous extended stored procedures -- Oracle default usernames and passwords. 
520 8 |a Annotation  |b Databases are the nerve center of our economy. Every piece of your personal information is stored there & ndash;medical records, bank accounts, employment history, pensions, car registrations, even your children & prime;s grades and what groceries you buy. Database attacks are potentially crippling & ndash;and relentless.<br /><br />In this essential follow & ndash;up to The Shellcoder & prime;s Handbook, four of the world & prime;s top security experts teach you to break into and defend the seven most popular database servers. You & prime;ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.<br /> & lowast; Identify and plug the new holes in Oracle and Microsoft(r) SQL Server<br /> & lowast; Learn the best defenses for IBM & prime;s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers<br /> & lowast; Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access<br /> & lowast; Recognize vulnerabilities peculiar to each database<br /> & lowast; Find out what the attackers already know<br /><br />Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download. 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Database security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
700 1 |a Litchfield, David,  |d 1975-  |4 aut 
776 0 8 |i Print version:  |t Database hacker's handbook.  |d Indianapolis, Ind. : Wiley, ©2005  |w (DLC) 2005008241  |w (OCoLC)58789031 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780764578014/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a Internet Archive  |b INAR  |n databasehackersh0000unse 
938 |a Books 24x7  |b B247  |n bks00005134 
938 |a EBSCOhost  |b EBSC  |n 492745 
938 |a YBP Library Services  |b YANK  |n 10250277 
994 |a 92  |b IZTAP